Skip to main content
  • Conference proceedings
  • © 1997

Information Security and Privacy

Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1270)

Conference series link(s): ACISP: Australasian Conference on Information Security and Privacy

Conference proceedings info: ACISP 1997.

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (30 papers)

  1. Cryptanalysis of adaptive arithmetic coding encryption schemes

    • Jen Lim, Colin Boyd, Ed Dawson
    Pages 216-227
  2. Fast correlation attacks and multiple linear approximations

    • M. Salmasizadeh, L. Simpson, J. Dj. Golić, E. Dawson
    Pages 228-239
  3. Verifiable escrowed signature

    • Wenbo Mao
    Pages 240-248
  4. Democratic key escrow scheme

    • Chor Wah Man, Rei. Safavi-Naini
    Pages 249-260
  5. Design and analyses of two basic protocols for use in TTP-based Key escrow

    • Feng Bao, Robert Deng, Yongfei Han, Albert Jeng
    Pages 261-270
  6. Protection of data and delegated keys in digital distribution

    • Masahiro Mambo, Eiji Okamoto, Kouichi Sakurai
    Pages 271-282
  7. New micropayment schemes based on Pay Words

    • Yi Mu, Vijay Varadharajan, Yan-Xia Lin
    Pages 283-293
  8. Enabling technology for the trading of MPEG-encoded Video

    • Jana Dittmann, Arnd Steinmetz
    Pages 314-324
  9. Image distribution method with embedded identifier scheme for copyright protection

    • Takehito Abe, Hiroshi Fujii, Kazuhiko Kushima
    Pages 325-336
  10. Back Matter

Other Volumes

  1. Information Security and Privacy

About this book

This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997.
The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications.

Bibliographic Information

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access